Untitled-2020-10-07T155316-543-5f7e38f2b41e2.jpg

Cyberstalking – How To Protect Yourself Online

When people think of close protection or private investigators the first thing they picture is probably a man in a suit jacket wearing sunglasses. And while in-person surveillance and protection is a big part of what we do, a lot of our work is also conducted online. Many clients come to us because they are concerned by threats they see online or compromised digital security.

In today’s blog post, we’re sharing some general information on cyberstalking and how you can protect yourself online. Continue reading to learn more, and if you’re in need of close protection in San Antonio or the surrounding area, contact Reveles Intelligence Group today.

cta3-5be082948d2d7.jpg

What Is Cyberstalking?

Cyberstalking is online stalking, but this type of stalking can take many different forms. Essentially, though, it is the repeated use of the internet or other electronic means to harass, intimate, or frighten a person or group of people. This can look like false accusations, monitoring of your activity or location, identity theft, data destruction, and more.

If you are a prominent cultural figure, politician, athlete, or executive, you will have a different relationship with people online. While online engagement is key to growing your brand or fan base, there can be a fine line between “super fan” and “cyberstalking.” While most super fans shouldn’t be considered a threat, there is a danger when fans or supports move into a more obsessive and compulsive territory.

How To Protect Yourself

There are ways to protect yourself, your devices, and your loved ones from cyberstalking. Here are a few tips:

  • Be careful about who you allow to have physical access to your computer, tablet, smartphone, and other web-enabled devices. Don’t leave your laptop on a table while you go to the restroom or let someone troubleshoot something on your devices. Cyberstalkers can use software and hardware devices to monitor their victims, including attaching hardware to the back of your PC without you even knowing it’s there.
  • Always log out of all of your programs when you step away from your computer and use a strong password. Use a strong password for your cell phone, and help others around you to do so as well.
  • Make calendars and itineraries private, even on your social media. If someone is cyberstalking you, you don’t want to let them know where you are and what events you’re planning on attending.
  • Utilize privacy settings on all online accounts, especially social media. A lot of your private information is often displayed there, including where you work and live. You can, and should, opt out of having your profile appear when someone searches for your name.
  • Turn off location services in the metadata of your photo. The metadata contains a lot of information, such as where and when it was taken, what device it was taken on, and other private information. You can turn this off in your phone’s settings.
  • Be aware of your online presence. Google yourself. See how many images there are of you and whether there is sensitive information online.
  • Hide your IP address using a VPN. Your IP address is directly tied to your personal data, such as your internet bill, your home, and the credit card you use to pay that bill. A VPN can mask that IP address to keep your data safe.

Reveles Intelligence Group – Close Protection

If you’re concerned about your safety, you may want to hire close protection. At Reveles Intelligence Group, our mission in everything we do is safety, security, and professionalism. We are a member of the United States Association of Professional Investigators, the Texas Association of Licensed Investigators, and the Better Business Bureau. If you’re in need of close protection or security services, contact us.